Securing Critical Infrastructure via Cybersecurity
Our critical infrastructure is the area that is most vulnerable to attacks, not just by physical attacks but also by keyboards. I put this together because....I can be affected and want to spark a discussion about truly solving the problem, even in abstract ways. Come here from speakers who represent some of the nation's critical infrastructure which include: Financial, Energy, Homeland Security, Transportation, and more. Topic we will cover Cyberattacks Risks to IoT (Connected Medical Devices, Health Records, Automated Technologies,etc) Risks to Food and Water Supply Risks to Medical Facilities and Patients Risks to our Tranportation System Risks to Banking and Financial Systems Mitigating Risks and Threats Best Practices Public/Private Partnerships Economic Impacts of Cyber Attacks Social Impacts of Successful Critical Infrastructure Attacks Meet the speakers Scott Tousley is the Deputy Director of the Cyber Security Division, a part of the DHS Science & Technology organization. He helps lead a 40+ person office and ~ $90 million annual research portfolio focused on many aspects of cyber security, supporting DHS Components, other government agencies and organizations, and national critical infrastructure sectors. Key areas of this RDT&E portfolio address Cyber Forensics, Insider Threat and Anonymous Networks and Currencies; Cyber-Physical systems and the “Internet of Things;” Mobile Systems cybersecurity; Software Security and Assurance; Critical Infrastructure Security and Resilience; Identity and Privacy; Cybersecurity Education and Training; and many other areas. Working with NIST/Sokwoo Rhee, Scott is helping to lead the GCTC Smart and Secure Cities and Communities Challenge. He served 20 years as an Army officer in the Corps of Engineers, many of these years in interagency technology programs, including the initial Watch/Warning Unit Chief of theFBI/National Infrastructure Protection Center, part of the Clinton Administration’s early engagement with national cyber security challenges. His experience also includes managing the operations security team for a large Internet Service Provider, principal with a technology start-up company in the private sector, and program manager for MITRE support to the DHS National Cybersecurity Division. He holds graduate degrees in nuclear engineering from Texas A&M, and national security strategy from the Army Command & Staff College. Scott has served 10 years with DHS, principally with S&T but also with the Domestic Nuclear Detection Office and several other parts of DHS. Marc serves within U.S. government, advising senior officials on advanced and emerging health technologies. He is a recognized health systems and health information technology expert with more than thirty years of experience in the federal and private sectors, is highly focused on Health IT strategy and solutions, health care policy, planning and program management. He is known for building extensive relationships among the federal Health IT Community including wide recognition as an innovative problem solver. Today, Marc is collaborating on medical cybersecurity, precision medicine, and advanced and emerging health IT solutions for empowering the nation’s Veterans including IT digital infrastructure and Learning Health Systems. Marc served within PwC, PricewaterhouseCoopers, in the position of Director Washington Federal Practice, Health IT. He focused on developing business strategies and solutions for health informatics and business process change. Marc served within Northrop Grumman Health Systems Management as Senior Adviser, Federal Health IT; there Marc provided leadership in the collaboration and delivery of the nation’s initial mobile Health Applications, Blue Button for MyHealtheVet, for the first time for Veterans to receive their personal health records on smart phones. While in government, Marc worked on federal health IT sharing; served within U.S. Department of Defense, Telemedicine and Advanced Technology Research Center (TATRC) as well as the U.S. Department of Health and Human Services, Health Resources and Services Administration. He also led hospital systems planning for Greater Boston. Marc served as adjunct professor in Health Informatics within The George Washington University and is the author of many articles and co-authored the book, “Medical Informatics 20/20: Quality and Electronic Health Records through Collaboration, Open Solutions and Innovation.” Marc completed his healthcare background at Harvard University, Brandeis University and the George Washington University. Transportation Security Administration, Chief Information Security Officer Paul D. Morris Mr. Morris is the Chief Information Security Officer and Executive Director, Information Assurance & Cybersecurity Division within TSA’s Office of Information Technology. He joined the ranks of the Senior Executive Service in June 2015. He serves as the Senior Cyber Executive for TSA where he is responsible for the Vision, Strategy and Execution for Cyber Defensive Operations, Governance, Compliance and Risk Management to defend data and information systems for 60,000+ employees/contractors and the traveling public. He provides leadership, management and operational direction for: Federal Information Security Modernization Act (FISMA) Governance, Compliance and Policy; Cybersecurity Awareness and Operational Support; Critical Infrastructure Protection; Secure Infrastructure and Vulnerability Management; Identity, Credential and Access Management (ICAM); e-Discovery, Insider Threat Program, Forensic Operations and a 24x7 Cyber Security Operations Center. Previously, Mr. Morris was the Chief, Computer Network Defense team whose 24/7 mission was the prevention of cyber security incidents through proactive continuous cyber threat analysis, network and computer scanning for vulnerabilities and Incident Response. Joining the TSA team in November 2013 as the Acting Director for the Classified Technology Division within the Office of Intelligence & Analysis, his team enabled mission-critical 24/7 classified information technology voice, video and data products and services in support of TSA employees at airports and field locations around the world. Mr. Morris joined TSA from the Office of Naval Intelligence (ONI) where he served as the senior intelligence executive responsible for capturing, integrating and articulating ONI’s often complex and unique collections requirements to the Intelligence Community, the Navy Fleets and Navy staff. Prior to this assignment Mr. Morris served as the ONI Assistant Director for Maritime Architecture where he oversaw the strategic planning, enterprise architecture, data integrity and governance for all aspects of a global Maritime Intelligence, Surveillance & Reconnaissance Enterprise. Mr. Morris has served in a variety of corporate, government and military leadership, technology, strategy, and staff positions. Mr. Morris has received several military and civilian awards including the Department of the Navy Meritorious Civilian Service Award. He holds a Bachelor’s of Science degree in Sociology from Excelsior College, NY, a Graduate Certificate in Cybersecurity from the University of Maryland University College (UMUC) and is a recent graduate of the Federal Executive Institute (LDS #421). OWNER OPERATOR DMB CYBER SECURITY LLC William Gafford BIO Mr. Gafford is a Plank Holder member of the Military Cyber Professional Association and National Veteran Small Business Coalition. Mr. Gafford served in both the US Navy and US Army and was honorably discharged from both services. With a degree in Information Systems from Strayer University, Mr. Gafford spent a decade creating, deploying and ushering through NIST Accreditation network systems for the Central Intelligence Agency. He was awarded the McCone award for innovation and the Houdini award for accomplishment during his time at the Agency. He was also awarded over twenty-five thousand dollars of Exceptional Performance Awards in cash incentive bonuses. Mr. Gafford leads his customers to the Art of Possible with his extraordinary solutions. Federal Certification & Accreditation o NIST 800 – 53 (FISMA, ICD 503, FEDRAMP) – Capable of taking clients to successful accreditation under any and all NIST methodologies. o 3PAO – Third Party Assessment Organization - Application is in awaiting approval. o Ability to build and obtain accreditation ICD 705 SCIF space through TS/SCI. Cyber Defense Platform Vulnerability Assessment – full assessment in five days, ability to run continuous – attack vector identification and mitigation – following the risk management framework CNG’s assessment assigns a risk score to each attack vector with a proprietary algorithm – pulling together from tactical intelligence points such as Nessus, Wireshark, and Splunk Intrusion Detection & Prevention – Distant endpoint protection, parameter protection, and data security Forensics Examination – patent-pending technology – available once Patent Trademark Office responds to application submittal – is tactical in nature and can run continuously in nature for full-time forensic analysis Network Monitoring – single pane of glass to facilitate transparency in a client’s network and support proactive network event management (Network Monitoring and DarkWeb) Cyber Assessment – this assessment delivers a productized cyber defense platform for the clients that will demonstrate return on investment through its network defense efficiencies and capabilities Penetration Testing – a testing of both the physical and logical security of the system that yields a full spectrum security evaluation will a developed strategy to deploy countermeasures Network Architecture Design and Build – ability to gather customer requirements and turn them into a network diagram with build scenarios and timelines for deployment, these networks are built, designed and deployed to exceed NIST 800 – 53 standards and where needed satisfy ICD 705 certification for SCIF accreditation Infrastructure Management – Bringing all of a client’s assets under one management is critical for transparency, monitoring, and compliance. CNG offers its customers a package that currently has five hundred thousand shapes in the library and can load close to one hundred and fifty thousand assets in a 30-day span. Data Protection In Transit and At Rest – CNG deploys technics and capacities acquired from a decade of moving data at the CIA. This includes non-secure methods of internet traffic and satellite transmitting. CNG is equally comfortable delivering data for clients at the TS/SCI level. Network Security – From both the data protection point of view and the network perimeter standpoint, CNG provides a full-scale security protection suite Insider Threat – From the data level up, CNG starts with data protection, then with the user, and onward to the network. With this 360 degree of protection, CNG can offer concentric circles of defense to support all aspects of the customers’ business goals. Setting parameters on the user and the data allows CNG to ensure through specific encryption methodologies the ability to control and stop insider threat attacks. Border Gateway Protection – Ability to protect the gateway from IP High jacking. Harjaap Singh is a problem-solver interested in Asia-Pacific geopolitics. He is Vice President of Programs at Young Professionals in Foreign Policy (YPFP) overseeing the development and execution of events. He previously worked at the United States Department of Agriculture. He has a background in event design, startups, and government contributing his technology skills to add value to teams in achieving their goals. He continues to share his insight on how technology is reshaping society and policy around the world. He earned a BS in Diplomacy and International Relations from Seton Hall University with a double major in Asian Area Studies and History. He has also studied in China and Japan and traveled to India, South Africa, and Kosovo.